7.5
CVE-2023-3132
- EPSS 0.53%
- Veröffentlicht 27.06.2023 03:15:09
- Zuletzt bearbeitet 08.04.2026 19:18:22
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
MainWP Child <= 4.4.1.1 - Information Disclosure via Back-Up Files
The MainWP Child plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.4.1.1 due to insufficient controls on the storage of back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including the entire installations database if a backup occurs and the deletion of the back-up files fail.
Mögliche Gegenmaßnahme
MainWP Child – Securely Connects to the MainWP Dashboard to Manage Multiple Sites: Update to version 4.4.1.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
MainWP Child – Securely Connects to the MainWP Dashboard to Manage Multiple Sites
Version
*-4.4.1.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mainwp ≫ Mainwp Child SwPlatformwordpress Version <= 4.4.1.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.53% | 0.667 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| security@wordfence.com | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.